Contraband Imports
One of the issues malware writers deal with is having their programs load and execute on a victimâs computer. An unwary victim may click on an email attachment and have the malware run once. But in order to continue to be of value to the author, that piece of malware has to arrange for itself to be run after the computer inevitably gets rebooted. There are several well known ways to accomplish this task. The problem here is these methods are well known and security software know where to look. Which brings us to the topic of this blog entry. We recently came across a hacked copy of imm32.dll which is Microsoftâs Input Method Manager library. The authors inserted an extra imported library into the fileâs import directory. The extra library name starts with ânetâ and the imported function name is randomized. ...